Impacts and risk assessment of technology for Internet security : enabled information small-medium enterprises (TEISMES) /

Saved in:
Bibliographic Details
Author / Creator:Shoniregun, Charles A.
Imprint:New York : Springer, 2005.
Description:1 online resource (x, 196 p.) : ill.
Language:English
Series:Advances in information security ; 17
Advances in information security ; 17.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/8874518
Hidden Bibliographic Details
ISBN:9780387243436 (alk. paper)
9780387263342 (e-book)
0387243437 (alk. paper)
0387263349 (e-book)
9786610312023
6610312028
Notes:Includes bibliographical references and index.
Description based on print version record.
Other form:Print version: Shoniregun, Charles A. Impacts and risk assessment of technology for Internet security. New York : Springer, 2005 0387243437
Table of Contents:
  • Dedications
  • List of Figures
  • List of Tables
  • List of Contributors and Organisations
  • Preface
  • Acknowledgements
  • 1. Research Overview and Technologies for Internet security
  • 1. Introduction
  • 2. Research Rationale
  • 3. Research Hypothesis
  • 4. Conceptual Research Context
  • 5. TEISMEs Business Operational Risks
  • 6. Technology for Internet Security
  • 7. Summary of Chapter One
  • References
  • 2. Impacts of TEI on SMEs
  • 1. Introduction
  • 2. Impacts of TEI on SMEs in the UK
  • 3. Disintermediation and Reintermediation
  • 4. Promote Products to Suit Each Individual Customer
  • 5. Electronic Payment
  • 6. Generic Problems with Network Protocol Layers
  • 7. Application Security Problems
  • 8. Summary of Chapter Two
  • References
  • 3. Risk Assessment of TEI on TEISME
  • 1. Introduction
  • 2. Concept of Risk
  • 3. Risk and the Risk Assessment Approaches
  • 4. Quantitative Approaches
  • 5. Qualitative Risk Assessment Model
  • 6. Weaknesses Of Risk Assessment Models
  • 7. Why BS7799
  • 8. Summary of Chapter Three
  • References
  • 4. Methodology
  • 1. Introduction
  • 2. Method
  • 3. Shoniregun Risk Assessment Model
  • 4. Analysis of Shoniregun's Risk Assessment Model Implementation
  • 5. of Chapter Four
  • References
  • 5. Analysis of Results
  • 1. Introduction
  • 2. Analysis of 500 Teismes Based on co.uk Service Provider
  • 3. Laboratory Experiments
  • 4. Analysis of400 Teismes Questionnaire Survey
  • 5. Correlation Between Annual Sales and Vulnerability
  • 6. Analysis of Teismes Interviewed
  • 7. Analysis of Case Study Observations
  • 8. Shoniregun Teisme Risk Assessrnent Calculation
  • 9. Result Summary of Hypotheses Test
  • 10. Summary of Chapter Five
  • References
  • 6. Critical Evaluation and Discussion
  • 1. Introduction
  • 2. Challenges of TEI on Information Security
  • 3. Shared Threats
  • 4. Teismes Business Operations are not Immune to Internet Attacks
  • 5. Risks and Trust
  • 6. Teisme Business Operational Risk Liability
  • 7. Current Developments in Internet Security
  • 8. Government Concern Over Security
  • 9. of Chapter Six
  • References
  • 7. Conclusion
  • 1. Global Issues and Internet Security Facing TEISMEs
  • 2. Recommendations
  • 3. FutureWork
  • References
  • Index